Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 14.593
1.
  • Automatic Defect Categoriza... Automatic Defect Categorization
    Thung, F.; Lo, D.; Lingxiao Jiang 2012 19th Working Conference on Reverse Engineering, 2012-Oct.
    Conference Proceeding
    Odprti dostop

    Defects are prevalent in software systems. In order to understand defects better, industry practitioners often categorize bugs into various types. One common kind of categorization is the IBM's ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM

PDF
2.
  • A Survey on Chip to System ... A Survey on Chip to System Reverse Engineering
    Quadir, Shahed E.; Chen, Junlin; Forte, Domenic ... ACM journal on emerging technologies in computing systems, 12/2016, Letnik: 13, Številka: 1
    Journal Article
    Recenzirano

    The reverse engineering (RE) of electronic chips and systems can be used with honest and dishonest intentions. To inhibit RE for those with dishonest intentions (e.g., piracy and counterfeiting), it ...
Celotno besedilo
Dostopno za: NUK, UL
3.
  • Reverse engineering modelin... Reverse engineering modeling methods and tools: a survey
    Buonamici, Francesco; Carfagni, Monica; Furferi, Rocco ... Computer-aided design and applications, 20/5/4/, Letnik: 15, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Reverse Engineering (RE) is a long-term goal of engineering and computer science; it aims at the reconstruction of CAD models from measured data by means of 3D mathematical surfaces and geometrical ...
Celotno besedilo
Dostopno za: UL

PDF
4.
  • On Reverse Engineering-Base... On Reverse Engineering-Based Hardware Trojan Detection
    Chongxi Bao; Forte, Domenic; Srivastava, Ankur IEEE transactions on computer-aided design of integrated circuits and systems, 2016-Jan., 2016-1-00, 20160101, Letnik: 35, Številka: 1
    Journal Article
    Recenzirano

    Due to design and fabrication outsourcing to foundries, the problem of malicious modifications to integrated circuits (ICs), also known as hardware Trojans (HTs), has attracted attention in academia ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
5.
  • Adversarial Learning Target... Adversarial Learning Targeting Deep Neural Network Classification: A Comprehensive Review of Defenses Against Attacks
    Miller, David J.; Xiang, Zhen; Kesidis, George Proceedings of the IEEE, 03/2020, Letnik: 108, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    With wide deployment of machine learning (ML)-based systems for a variety of applications including medical, military, automotive, genomic, multimedia, and social networking, there is great potential ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
6.
  • From predictive modelling t... From predictive modelling to machine learning and reverse engineering of colloidal self-assembly
    Dijkstra, Marjolein; Luijten, Erik Nature materials, 06/2021, Letnik: 20, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    An overwhelming diversity of colloidal building blocks with distinct sizes, materials and tunable interaction potentials are now available for colloidal self-assembly. The application space for ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBMB, UL, UM, UPUK, ZAGLJ
7.
  • Convex Geometry Perspective... Convex Geometry Perspective on the (Standard Model) Effective Field Theory Space
    Zhang, Cen; Zhou, Shuang-Yong Physical review letters, 11/2020, Letnik: 125, Številka: 20
    Journal Article
    Recenzirano
    Odprti dostop

    We present a convex geometry perspective to the effective field theory (EFT) parameter space. We show that the second s derivatives of the forward EFT amplitudes form a convex cone, whose extremal ...
Celotno besedilo
Dostopno za: CMK, CTK, FMFMET, IJS, NUK, PNG, UL, UM

PDF
8.
  • Classical system approach t... Classical system approach to reverse engineering
    Ivonov, A V; Volkova, E V; Daudov, I M Journal of physics. Conference series, 07/2020, Letnik: 1582, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    The paper presents one of the possible solutions of the reverse engineering problem from the point of view of the classical system approach, as well as highlights the direction for the development of ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
9.
  • A model‐based framework for... A model‐based framework for inter‐app Vulnerability analysis of Android applications
    Nirumand, Atefeh; Zamani, Bahman; Tork‐Ladani, Behrouz ... Software, practice & experience, April 2023, 2023-04-00, 20230401, Letnik: 53, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Android users install various apps, such as banking apps, on their smart devices dealing with user‐sensitive information. The Android framework, via Inter‐Component Communication (ICC) mechanism, ...
Celotno besedilo
Dostopno za: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SBCE, SBMB, UL, UM, UPUK
10.
  • Protecting Software through... Protecting Software through Obfuscation
    Schrittwieser, Sebastian; Katzenbeisser, Stefan; Kinder, Johannes ... ACM computing surveys, 07/2016, Letnik: 49, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Software obfuscation has always been a controversially discussed research area. While theoretical results indicate that provably secure obfuscation in general is impossible, its widespread ...
Celotno besedilo
Dostopno za: IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK
1 2 3 4 5
zadetkov: 14.593

Nalaganje filtrov